JP2016509268A - プライバシーを保護する計数の方法およびシステム - Google Patents
プライバシーを保護する計数の方法およびシステム Download PDFInfo
- Publication number
- JP2016509268A JP2016509268A JP2015561331A JP2015561331A JP2016509268A JP 2016509268 A JP2016509268 A JP 2016509268A JP 2015561331 A JP2015561331 A JP 2015561331A JP 2015561331 A JP2015561331 A JP 2015561331A JP 2016509268 A JP2016509268 A JP 2016509268A
- Authority
- JP
- Japan
- Prior art keywords
- record
- records
- tokens
- evaluator
- csp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44213—Monitoring of end-user related data
- H04N21/44222—Analytics of user selections, e.g. selection of programs or purchase activity
- H04N21/44224—Monitoring of user activity on external systems, e.g. Internet browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/251—Learning process for intelligent management, e.g. learning user preferences for recommending movies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25891—Management of end-user data being end-user preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/466—Learning process for intelligent management, e.g. learning user preferences for recommending movies
- H04N21/4668—Learning process for intelligent management, e.g. learning user preferences for recommending movies for recommending content, e.g. movies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/65—Transmission of management data between client and server
- H04N21/658—Transmission by the client directed to the server
- H04N21/6582—Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/50—Oblivious transfer
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Social Psychology (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Graphics (AREA)
- Algebra (AREA)
- Evolutionary Computation (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
本願は、米国特許法第119条(e)の下で、2013年8月9日に出願された米国仮特許出願、第61/864085号明細書、発明の名称「A METHOD AND SYSTEM FOR PRIVACY PRESERVING COUNTING」、第61/864088号明細書、発明の名称「A METHOD AND SYSTEM FOR PRIVACY PRESERVING MATRIX FACTORIZATION」、第61/864094号明細書、発明の名称「A METHOD AND SYSTEM FOR PRIVACY−PRESERVING RECOMMENDATION TO RATING CONTRIBUTING USERS BASED ON MATRIX FACTORIZATION」、および第61/864098号明細書、発明の名称「A METHOD AND SYSTEM FOR PRIVACY−PRESERVING RECOMMENDATION BASED ON MATRIX FACTORIZATION AND RIDGE REGRESSION」に対する優先権を主張する。これら仮出願は、実質上その全体が参照によって本明細書に明示的に組み込まれる。
s2,k←s3,k+s3,k+1×s2,k+1 (3)
C4.今度はフラグsl,kに対して昇順で再度配列をソートする(440)。その結果得られる配列の最初のm個のタプルはカウンタを含んでおり、それらが出力として公開される。
Claims (32)
- レコードを安全に計数して、前記レコードを評価する評価器(230)に対して前記レコードがプライベートに保たれるようにする方法であって、
レコードのセットを受信するステップ(220,340)であって、各レコードはトークンのセットを含み、各レコードは前記レコードのソース以外のパーティから秘密に保たれる、前記受信するステップと、
ガーブル回路(370)により前記レコードのセットを評価するステップであって、前記ガーブル回路の出力は総数である、前記評価するステップと、
を含む、前記方法。 - トークンの別個のセットを受信するかまたは決定するステップ(320)をさらに含む、請求項1に記載の方法。
- 前記レコードのセット内の前記トークンの別個のセットを計数するために、前記ガーブル回路を暗号システムプロバイダ(CSP)において設計するステップ(350)と、
前記ガーブル回路を前記評価器に転送するステップ(360)と、
をさらに含む、請求項2に記載の方法。 - 前記設計するステップは、
カウンタをブール回路として設計するステップ(352)をさらに含む、請求項3に記載の方法。 - カウンタを設計する前記ステップは、
前記レコードのセットおよび前記トークンの別個のセットの配列を構築するステップ(410)と、
前記配列上でソート(420,440)、シフト(430)、加算(430)および格納の動作を実行するステップと、
を含む、請求項4に記載の方法。 - 前記受信するステップは、ソース、前記評価器および前記CSPの間でプロキシ紛失通信(342)により実行され(350)、前記ソースは前記レコードを提供し、前記レコードは前記評価器および前記CSPに対してプライベートに保たれ、前記ガーブル回路は入力として前記レコードのガーブル値を取得する、請求項1に記載の方法。
- 暗号化されたレコードを作成するために前記レコードのセットを暗号化するステップ(380)をさらに含み、前記暗号化するステップは、前記レコードのセットを受信するステップの前に実行される、請求項3に記載の方法。
- 前記設計するステップ(350)は、
前記暗号化されたレコードを、処理の前に前記ガーブル回路の内部で復号化するステップ(354)を含む、請求項7に記載の方法。 - 前記暗号化は部分的準同型暗号化であり(382)、
前記評価器において前記暗号化されたレコードをマスクしてマスクされたレコードを作成するステップ(385)と、
前記CSPにおいて前記マスクされたレコードを復号化して復号化されマスクされたレコードを作成するステップ(395)と、
を含む、請求項7に記載の方法。 - 前記設計するステップ(350)は、
前記ガーブル回路の内部で、前記復号化されマスクされたレコードを、処理の前にマスク解除するステップ(356)を含む、請求項9に記載の方法。 - 各レコードは重みのセットをさらに含み、
前記重みのセットは少なくとも1つの重みを含む、請求項1に記載の方法。 - 前記重みは、前記レコードのそれぞれのトークンの頻度の測度および評点のうちの1つに対応する、請求項11に記載の方法。
- 各レコードのトークンの数を受信するステップ(220、310)をさらに含む、請求項1に記載の方法。
- 各レコードのトークンの数が最大値を表す値より小さい場合、前記値に等しい数のトークンによりレコードを作成するために、各レコードをヌルエントリでパディングするステップ(312)
をさらに含む、請求項1に記載の方法。 - 前記レコードのセットのソースは、データベースとユーザのセット(210)とのうちの一方であり、前記ソースがユーザのセットである場合、各ユーザは少なくとも1つのレコードを提供する、請求項1に記載の方法。
- 前記CSPにより、ガーブル回路の設計のためのパラメータのセットを受信するステップをさらに含み、前記パラメータは前記評価器により送信されたものである(330)、請求項3に記載の方法。
- レコードを安全に計数するシステムであって、前記レコードを提供するソース、安全なカウンタを提供する暗号サービスプロバイダ(CSP)および前記レコードを評価する評価器を含み、前記レコードが前記評価器および前記CSPに対してプライベートに保たれるようにしたシステムであって、前記ソース、前記CSPおよび前記評価器はそれぞれ、
少なくとも1つの入力/出力(404)を受信するプロセッサー(402)と、
前記プロセッサーと信号通信する少なくとも1つのメモリ(406、408)と、
を備え、前記評価器のプロセッサーは、
レコードのセットを受信し、各レコードはトークンのセットを含み、各レコードは秘密に保たれ、
ガーブル回路により前記レコードのセットを評価し、前記ガーブル回路の出力が総数となるように構成される、前記システム。 - 前記評価器のプロセッサーは、トークンの別個のセットを受信するように構成される、請求項17に記載のシステム。
- 前記CSPのプロセッサーは、
前記レコードのセット内の前記トークンの別個のセットを計数するために、前記ガーブル回路を設計し、
前記ガーブル回路を前記評価器に転送するように構成される、請求項18に記載のシステム。 - 前記CSPのプロセッサーは、
カウンタをブール回路として設計するように構成されることにより、前記ガーブル回路を設計するように構成される、請求項19に記載のシステム。 - 前記CSPのプロセッサーは、
前記レコードのセットおよび前記トークンの別個のセットの配列を構築し、
前記配列上で、ソート、シフト、加算および格納の動作を実行するように構成されることにより、前記カウンタを設計するように構成される、請求項20に記載のシステム。 - 前記ソースのプロセッサー、前記評価器のプロセッサーおよび前記CSPのプロセッサーはプロキシ紛失通信を実行するように構成され、前記ソースは前記レコードを提供し、前記レコードは前記評価器および前記CSPに対してプライベートに保たれ、前記ガーブル回路は入力として前記レコードのガーブル値を取得する、請求項17に記載のシステム。
- 前記ソースのプロセッサーは、
暗号化されたレコードを作成するために、前記レコードのセットを処理の前に暗号化するように構成される、請求項19に記載のシステム。 - 前記CSPのプロセッサーは、
前記暗号化されたレコードを、処理の前に前記ガーブル回路の内部で復号化するようにさらに構成されることにより、前記ガーブル回路を設計するように構成される、請求項23に記載のシステム。 - 前記暗号化は部分的準同型暗号化であり、前記評価器のプロセッサーは、
前記暗号化されたレコードをマスクしてマスクされたレコードを作成するようにさらに構成され、前記CSPのプロセッサーは、
前記マスクされたレコードを復号化して復号化されマスクされたレコードを作成するようにさらに構成される、請求項23に記載のシステム。 - 前記CSPのプロセッサーは、
前記ガーブル回路の内部で、前記復号化されマスクされたレコードを、処理の前にマスク解除するようにさらに構成されることにより前記ガーブル回路を設計するように構成される、請求項25に記載のシステム。 - 各レコードは重みのセットをさらに含み、
前記重みのセットは少なくとも1つの重みを含む、請求項17に記載のシステム。 - 前記重みは、前記レコードのそれぞれのトークンの頻度の測度および評価のうちの1つに対応する、請求項27に記載のシステム。
- 前記評価器のプロセッサーは、
各レコードのトークンの数を受信するようにさらに構成され、前記トークンの数は前記ソースから送信されたものである、請求項17に記載のシステム。 - 前記ソースのプロセッサーは、
各レコードのトークンの数が最大値を表す値より小さい場合、前記値に等しい数のトークンによりレコードを作成するために、各レコードをヌルエントリでパディングするようにさらに構成される、請求項17に記載のシステム。 - 前記レコードのセットのソースは、データベースとユーザのセットとのうちの一方であり、前記ソースがユーザのセットである場合、各ユーザは、少なくとも1つの入力/出力(504)を受信するプロセッサー(502)と、少なくとも1つのメモリ(506、508)とを含み、各ユーザは少なくとも1つのレコードを提供する、請求項17に記載のシステム。
- 前記CSPのプロセッサーは、
ガーブル回路の設計のためのパラメータのセットを受信するようにさらに構成され、前記パラメータは前記評価器により送信されたものである、請求項19に記載のシステム。
Applications Claiming Priority (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361772404P | 2013-03-04 | 2013-03-04 | |
US61/772,404 | 2013-03-04 | ||
US201361864094P | 2013-08-09 | 2013-08-09 | |
US201361864088P | 2013-08-09 | 2013-08-09 | |
US201361864098P | 2013-08-09 | 2013-08-09 | |
US201361864085P | 2013-08-09 | 2013-08-09 | |
US61/864,098 | 2013-08-09 | ||
US61/864,094 | 2013-08-09 | ||
US61/864,088 | 2013-08-09 | ||
US61/864,085 | 2013-08-09 | ||
PCT/US2013/076353 WO2014137449A2 (en) | 2013-03-04 | 2013-12-19 | A method and system for privacy preserving counting |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2016509268A true JP2016509268A (ja) | 2016-03-24 |
JP2016509268A5 JP2016509268A5 (ja) | 2016-12-28 |
Family
ID=51492081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015561331A Withdrawn JP2016509268A (ja) | 2013-03-04 | 2013-12-19 | プライバシーを保護する計数の方法およびシステム |
Country Status (6)
Country | Link |
---|---|
US (4) | US20160019394A1 (ja) |
EP (3) | EP2965464A2 (ja) |
JP (1) | JP2016509268A (ja) |
KR (3) | KR20150122162A (ja) |
CN (1) | CN105637798A (ja) |
WO (4) | WO2014137449A2 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022517494A (ja) * | 2018-12-18 | 2022-03-09 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 秘匿共通集合演算(psi)を用いる機密データのセキュアなマルチパーティ検出 |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015163822A1 (en) * | 2014-04-23 | 2015-10-29 | Agency For Science, Technology And Research | Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database |
US9787647B2 (en) * | 2014-12-02 | 2017-10-10 | Microsoft Technology Licensing, Llc | Secure computer evaluation of decision trees |
US9825758B2 (en) * | 2014-12-02 | 2017-11-21 | Microsoft Technology Licensing, Llc | Secure computer evaluation of k-nearest neighbor models |
US20160189461A1 (en) * | 2014-12-27 | 2016-06-30 | Avi Kanon | Near field communication (nfc) based vendor/customer interface |
WO2017023065A1 (en) * | 2015-08-05 | 2017-02-09 | Samsung Electronics Co., Ltd. | Electronic apparatus and control method thereof |
US20170359321A1 (en) * | 2016-06-13 | 2017-12-14 | Microsoft Technology Licensing, Llc | Secure Data Exchange |
GB201610883D0 (en) * | 2016-06-22 | 2016-08-03 | Microsoft Technology Licensing Llc | Privacy-preserving machine learning |
US10755172B2 (en) | 2016-06-22 | 2020-08-25 | Massachusetts Institute Of Technology | Secure training of multi-party deep neural network |
EP3270321B1 (en) * | 2016-07-14 | 2020-02-19 | Kontron Modular Computers SAS | Technique for securely performing an operation in an iot environment |
US10628604B1 (en) * | 2016-11-01 | 2020-04-21 | Airlines Reporting Corporation | System and method for masking digital records |
KR20180081261A (ko) * | 2017-01-06 | 2018-07-16 | 경희대학교 산학협력단 | 왜곡된 데이터에 대한 프라이버시 보호 시스템 및 방법 |
US11777729B2 (en) | 2017-01-20 | 2023-10-03 | Enveil, Inc. | Secure analytics using term generation and homomorphic encryption |
US10644876B2 (en) * | 2017-01-20 | 2020-05-05 | Enveil, Inc. | Secure analytics using homomorphic encryption |
US11196541B2 (en) | 2017-01-20 | 2021-12-07 | Enveil, Inc. | Secure machine learning analytics using homomorphic encryption |
US11507683B2 (en) | 2017-01-20 | 2022-11-22 | Enveil, Inc. | Query processing with adaptive risk decisioning |
US10972251B2 (en) | 2017-01-20 | 2021-04-06 | Enveil, Inc. | Secure web browsing via homomorphic encryption |
US20180212753A1 (en) | 2017-01-20 | 2018-07-26 | Enveil, Inc. | End-To-End Secure Operations Using a Query Vector |
CN108733311B (zh) * | 2017-04-17 | 2021-09-10 | 伊姆西Ip控股有限责任公司 | 用于管理存储系统的方法和设备 |
US10491373B2 (en) * | 2017-06-12 | 2019-11-26 | Microsoft Technology Licensing, Llc | Homomorphic data analysis |
WO2019010430A2 (en) * | 2017-07-06 | 2019-01-10 | Robert Bosch Gmbh | METHOD AND SYSTEM FOR PUBLICITY BY SOCIAL MEDIA PRESERVING CONFIDENTIALITY |
WO2019040712A1 (en) * | 2017-08-23 | 2019-02-28 | Mochi, Inc. | METHOD AND SYSTEM FOR AUCTION AT DECENTRALIZED MARKET |
CN111543025A (zh) | 2017-08-30 | 2020-08-14 | 因福尔公司 | 高精度隐私保护实值函数评估 |
JP6759168B2 (ja) * | 2017-09-11 | 2020-09-23 | 日本電信電話株式会社 | 難読化回路生成装置、難読化回路計算装置、難読化回路生成方法、難読化回路計算方法、プログラム |
EP3461054A1 (en) | 2017-09-20 | 2019-03-27 | Universidad de Vigo | System and method for secure outsourced prediction |
US11818249B2 (en) * | 2017-12-04 | 2023-11-14 | Koninklijke Philips N.V. | Nodes and methods of operating the same |
WO2019121898A1 (en) * | 2017-12-22 | 2019-06-27 | Koninklijke Philips N.V. | A computer-implemented method of applying a first function to each data element in a data set, and a worker node and system for implementing the same |
US11194922B2 (en) * | 2018-02-28 | 2021-12-07 | International Business Machines Corporation | Protecting study participant data for aggregate analysis |
US11334547B2 (en) | 2018-08-20 | 2022-05-17 | Koninklijke Philips N.V. | Data-oblivious copying from a first array to a second array |
US10999082B2 (en) | 2018-09-28 | 2021-05-04 | Analog Devices, Inc. | Localized garbled circuit device |
CN109543094B (zh) * | 2018-09-29 | 2021-09-28 | 东南大学 | 一种基于矩阵分解的隐私保护内容推荐方法 |
BR112019008135B1 (pt) * | 2018-10-17 | 2022-01-04 | Advanced New Technologies Co., Ltd. | Método implementado por computador, meio legível por computador e sistema implementado por computador |
US10902133B2 (en) | 2018-10-25 | 2021-01-26 | Enveil, Inc. | Computational operations in enclave computing environments |
US10817262B2 (en) | 2018-11-08 | 2020-10-27 | Enveil, Inc. | Reduced and pipelined hardware architecture for Montgomery Modular Multiplication |
WO2020100118A1 (en) | 2018-11-15 | 2020-05-22 | Ravel Technologies SARL | Cryptographic anonymization for zero-knowledge advertising methods, apparatus, and system |
US10915642B2 (en) | 2018-11-28 | 2021-02-09 | International Business Machines Corporation | Private analytics using multi-party computation |
AU2020225657A1 (en) * | 2019-02-22 | 2021-08-19 | Inpher, Inc. | Arithmetic for secure multi-party computation with modular integers |
US11250140B2 (en) * | 2019-02-28 | 2022-02-15 | Sap Se | Cloud-based secure computation of the median |
US11245680B2 (en) * | 2019-03-01 | 2022-02-08 | Analog Devices, Inc. | Garbled circuit for device authentication |
CN110059097B (zh) * | 2019-03-21 | 2020-08-04 | 阿里巴巴集团控股有限公司 | 数据处理方法和装置 |
US11669624B2 (en) * | 2019-04-24 | 2023-06-06 | Google Llc | Response-hiding searchable encryption |
US11277449B2 (en) * | 2019-05-03 | 2022-03-15 | Virtustream Ip Holding Company Llc | Adaptive distributive data protection system |
CN110149199B (zh) * | 2019-05-22 | 2022-03-04 | 南京信息职业技术学院 | 一种基于属性感知的隐私保护方法及系统 |
AU2019461061B2 (en) * | 2019-08-14 | 2023-03-30 | Nippon Telegraph And Telephone Corporation | Secure gradient descent computation method, secure deep learning method, secure gradient descent computation system, secure deep learning system, secure computation apparatus, and program |
US11507699B2 (en) | 2019-09-27 | 2022-11-22 | Intel Corporation | Processor with private pipeline |
US11663521B2 (en) | 2019-11-06 | 2023-05-30 | Visa International Service Association | Two-server privacy-preserving clustering |
CN110830232B (zh) * | 2019-11-07 | 2022-07-08 | 北京静宁数据科技有限公司 | 基于同态加密算法的隐蔽式竞价方法及竞价系统 |
US11616635B2 (en) * | 2019-11-27 | 2023-03-28 | Duality Technologies, Inc. | Recursive algorithms with delayed computations performed in a homomorphically encrypted space |
CN111125517B (zh) * | 2019-12-06 | 2023-03-14 | 陕西师范大学 | 一种基于差分隐私和时间感知的隐式矩阵分解推荐方法 |
RU2722538C1 (ru) * | 2019-12-13 | 2020-06-01 | Общество С Ограниченной Ответственностью "Убик" | Компьютерно-реализуемый способ обработки информации об объектах, с использованием методов совместных вычислений и методов анализа данных |
KR102404983B1 (ko) | 2020-04-28 | 2022-06-13 | 이진행 | 릿지 회귀를 이용한 변수 선택 장치 및 방법 |
CN111768268B (zh) * | 2020-06-15 | 2022-12-20 | 北京航空航天大学 | 一种基于本地化差分隐私的推荐系统 |
CN112163228B (zh) * | 2020-09-07 | 2022-07-19 | 湖北工业大学 | 一种基于幺模矩阵加密的岭回归安全外包方法及系统 |
US11601258B2 (en) | 2020-10-08 | 2023-03-07 | Enveil, Inc. | Selector derived encryption systems and methods |
US11902424B2 (en) * | 2020-11-20 | 2024-02-13 | International Business Machines Corporation | Secure re-encryption of homomorphically encrypted data |
US20220191027A1 (en) * | 2020-12-16 | 2022-06-16 | Kyndryl, Inc. | Mutual multi-factor authentication technology |
US11113707B1 (en) | 2021-01-22 | 2021-09-07 | Isolation Network, Inc. | Artificial intelligence identification of high-value audiences for marketing campaigns |
US12081644B2 (en) * | 2021-02-01 | 2024-09-03 | Sap Se | Efficient distributed privacy-preserving computations |
US11308226B1 (en) * | 2021-02-22 | 2022-04-19 | CipherMode Labs, Inc. | Secure collaborative processing of private inputs |
US20220271914A1 (en) * | 2021-02-24 | 2022-08-25 | Govermment of the United of America as represented by the Secretary of the Navy | System and Method for Providing a Secure, Collaborative, and Distributed Computing Environment as well as a Repository for Secure Data Storage and Sharing |
CN114567710B (zh) * | 2021-12-03 | 2023-06-06 | 湖北工业大学 | 一种基于岭回归预测的可逆数据隐写方法及系统 |
CN114943041B (zh) * | 2022-05-17 | 2024-07-02 | 重庆邮电大学 | 一种基于差分隐私的隐式反馈协同过滤推荐方法 |
CN114726524B (zh) * | 2022-06-02 | 2022-08-19 | 平安科技(深圳)有限公司 | 目标数据的排序方法、装置、电子设备及存储介质 |
CN116383848B (zh) * | 2023-04-04 | 2023-11-28 | 北京航空航天大学 | 一种三方安全计算防作恶方法、设备及介质 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5940738A (en) * | 1995-05-26 | 1999-08-17 | Hyundai Electronics America, Inc. | Video pedestal network |
US6888848B2 (en) * | 2000-12-14 | 2005-05-03 | Nortel Networks Limited | Compact segmentation of variable-size packet streams |
US20020194602A1 (en) * | 2001-06-06 | 2002-12-19 | Koninklijke Philips Electronics N.V | Expert model recommendation method and system |
US20080205860A1 (en) * | 2005-02-18 | 2008-08-28 | Koninklijke Philips Electronics, N.V. | Method Of Live Submitting A Digital Signal |
CN101495941A (zh) * | 2006-08-01 | 2009-07-29 | 索尼株式会社 | 用于内容推荐的领域优化 |
US8712915B2 (en) * | 2006-11-01 | 2014-04-29 | Palo Alto Research Center, Inc. | System and method for providing private demand-driven pricing |
US9224427B2 (en) * | 2007-04-02 | 2015-12-29 | Napo Enterprises LLC | Rating media item recommendations using recommendation paths and/or media item usage |
US8001132B2 (en) * | 2007-09-26 | 2011-08-16 | At&T Intellectual Property I, L.P. | Methods and apparatus for improved neighborhood based analysis in ratings estimation |
US8131732B2 (en) * | 2008-06-03 | 2012-03-06 | Nec Laboratories America, Inc. | Recommender system with fast matrix factorization using infinite dimensions |
US7685232B2 (en) * | 2008-06-04 | 2010-03-23 | Samsung Electronics Co., Ltd. | Method for anonymous collaborative filtering using matrix factorization |
US8972742B2 (en) * | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
EP2481018A4 (en) * | 2009-09-21 | 2013-06-12 | Ericsson Telefon Ab L M | METHOD AND DEVICE FOR PERFORMING A RECOMMENDATION |
US8185535B2 (en) * | 2009-10-30 | 2012-05-22 | Hewlett-Packard Development Company, L.P. | Methods and systems for determining unknowns in collaborative filtering |
US8365227B2 (en) * | 2009-12-02 | 2013-01-29 | Nbcuniversal Media, Llc | Methods and systems for online recommendation |
US8676736B2 (en) * | 2010-07-30 | 2014-03-18 | Gravity Research And Development Kft. | Recommender systems and methods using modified alternating least squares algorithm |
US8881295B2 (en) * | 2010-09-28 | 2014-11-04 | Alcatel Lucent | Garbled circuit generation in a leakage-resilient manner |
US9088888B2 (en) * | 2010-12-10 | 2015-07-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure wireless communication using rate-adaptive codes |
WO2012155329A1 (en) * | 2011-05-16 | 2012-11-22 | Nokia Corporation | Method and apparatus for holistic modeling of user item rating with tag information in a recommendation system |
US10102546B2 (en) * | 2011-09-15 | 2018-10-16 | Stephan HEATH | System and method for tracking, utilizing predicting, and implementing online consumer browsing behavior, buying patterns, social networking communications, advertisements and communications, for online coupons, products, goods and services, auctions, and service providers using geospatial mapping technology, and social networking |
US8925075B2 (en) * | 2011-11-07 | 2014-12-30 | Parallels IP Holdings GmbH | Method for protecting data used in cloud computing with homomorphic encryption |
US8478768B1 (en) * | 2011-12-08 | 2013-07-02 | Palo Alto Research Center Incorporated | Privacy-preserving collaborative filtering |
US8983888B2 (en) * | 2012-11-07 | 2015-03-17 | Microsoft Technology Licensing, Llc | Efficient modeling system for user recommendation using matrix factorization |
-
2013
- 2013-12-19 JP JP2015561331A patent/JP2016509268A/ja not_active Withdrawn
- 2013-12-19 CN CN201380074041.9A patent/CN105637798A/zh active Pending
- 2013-12-19 WO PCT/US2013/076353 patent/WO2014137449A2/en active Application Filing
- 2013-12-19 KR KR1020157024146A patent/KR20150122162A/ko not_active Application Discontinuation
- 2013-12-19 EP EP13821039.8A patent/EP2965464A2/en not_active Withdrawn
- 2013-12-19 US US14/771,608 patent/US20160019394A1/en not_active Abandoned
-
2014
- 2014-05-01 WO PCT/US2014/036360 patent/WO2014138754A2/en active Application Filing
- 2014-05-01 US US14/771,534 patent/US20160004874A1/en not_active Abandoned
- 2014-05-01 EP EP14734966.6A patent/EP3031166A2/en not_active Withdrawn
- 2014-05-01 KR KR1020157024126A patent/KR20160009012A/ko not_active Application Discontinuation
- 2014-05-01 EP EP14730285.5A patent/EP3031164A2/en not_active Withdrawn
- 2014-05-01 US US14/771,659 patent/US20160012238A1/en not_active Abandoned
- 2014-05-01 US US14/771,527 patent/US20160020904A1/en not_active Abandoned
- 2014-05-01 WO PCT/US2014/036357 patent/WO2014138752A2/en active Application Filing
- 2014-05-01 KR KR1020157023908A patent/KR20160030874A/ko not_active Application Discontinuation
- 2014-05-01 WO PCT/US2014/036359 patent/WO2014138753A2/en active Application Filing
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022517494A (ja) * | 2018-12-18 | 2022-03-09 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 秘匿共通集合演算(psi)を用いる機密データのセキュアなマルチパーティ検出 |
JP7355405B2 (ja) | 2018-12-18 | 2023-10-03 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 秘匿共通集合演算(psi)を用いる機密データのセキュアなマルチパーティ検出 |
Also Published As
Publication number | Publication date |
---|---|
EP2965464A2 (en) | 2016-01-13 |
WO2014137449A3 (en) | 2014-12-18 |
KR20150122162A (ko) | 2015-10-30 |
US20160012238A1 (en) | 2016-01-14 |
US20160020904A1 (en) | 2016-01-21 |
WO2014138754A3 (en) | 2014-11-27 |
KR20160009012A (ko) | 2016-01-25 |
WO2014138752A2 (en) | 2014-09-12 |
WO2014138752A3 (en) | 2014-12-11 |
WO2014137449A2 (en) | 2014-09-12 |
US20160019394A1 (en) | 2016-01-21 |
US20160004874A1 (en) | 2016-01-07 |
WO2014138753A2 (en) | 2014-09-12 |
EP3031166A2 (en) | 2016-06-15 |
CN105637798A (zh) | 2016-06-01 |
EP3031164A2 (en) | 2016-06-15 |
KR20160030874A (ko) | 2016-03-21 |
WO2014138753A3 (en) | 2014-11-27 |
WO2014138754A2 (en) | 2014-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2016509268A (ja) | プライバシーを保護する計数の方法およびシステム | |
KR102596445B1 (ko) | 개인 정보 보호를 위한 방법 | |
JP2016517069A (ja) | 行列因数分解に基づいたユーザに寄与する評点に対するプライバシー保護推薦のための方法およびシステム | |
EP2602755A1 (en) | Privacy-preserving collaborative filtering | |
Bilogrevic et al. | What’s the gist? Privacy-preserving aggregation of user profiles | |
Wang et al. | PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs | |
Alnajrani et al. | Privacy and data protection in mobile cloud computing: A systematic mapping study | |
Kim et al. | Privacy-preserving naive bayes classification using fully homomorphic encryption | |
Perez et al. | A smartphone-based online social network trust evaluation system | |
CN111046408A (zh) | 判断结果处理方法、查询方法、装置、电子设备和系统 | |
CN111159730A (zh) | 数据处理方法、查询方法、装置、电子设备和系统 | |
US20220382908A1 (en) | Private joining, analysis and sharing of information located on a plurality of information stores | |
EP4393111A1 (en) | Secure computation using multi-party computation and a trusted execution environment | |
Russo et al. | Dare‐to‐Share: Collaborative privacy‐preserving recommendations with (almost) no crypto | |
Ren et al. | Lipisc: a lightweight and flexible method for privacy-aware intersection set computation | |
Ramezanian et al. | Multi-party private set operations with an external decider | |
Wang et al. | A flexible and privacy-preserving federated learning framework based on logistic regression | |
Bai et al. | Understanding user tradeoffs for search in encrypted communication | |
Gorripati et al. | Recommender systems: security threats and mechanisms | |
US20240313953A1 (en) | Efficient garbled circuit protocol for secure multi-party computation | |
He et al. | Impact factor-based group recommendation scheme with privacy preservation in MSNs | |
Melis | Building and evaluating privacy-preserving data processing systems | |
Jung | Ensuring Security and Privacy in Big Data Sharing, Trading, and Computing | |
Archer et al. | UN Handbook on Privacy-Preserving Computation Techniques | |
Iyer | Ghost Recommendations: A Protocol for Efficiently Enhancing User Privacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Written amendment |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20161109 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20161109 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20161202 |
|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20161202 |
|
A761 | Written withdrawal of application |
Free format text: JAPANESE INTERMEDIATE CODE: A761 Effective date: 20170203 |